Juniper Junos OS Evolved vulnerabilities

231 known vulnerabilities affecting juniper/junos_os_evolved.

Total CVEs
231
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH132MEDIUM97

Vulnerabilities

Page 11 of 12
CVE-2021-31362MEDIUMCVSS 6.5≤ 20.3v20.4+1 more2021-10-19
CVE-2021-31362 [MEDIUM] CWE-693 CVE-2021-31362: A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Ju A Protection Mechanism Failure vulnerability in RPD (routing protocol daemon) of Juniper Networks Junos OS and Junos OS Evolved allows an adjacent unauthenticated attacker to cause established IS-IS adjacencies to go down by sending a spoofed hello PDU leading to a Denial of Service (DoS) condition. Continued receipted of these spoofed PDUs will cre
nvd
CVE-2021-0298MEDIUMCVSS 4.7v18.3v19.1+4 more2021-10-19
CVE-2021-0298 [MEDIUM] CWE-362 CVE-2021-0298: A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an A Race Condition in the 'show chassis pic' command in Juniper Networks Junos OS Evolved may allow an attacker to crash the port interface concentrator daemon (picd) process on the FPC, if the command is executed coincident with other system events outside the attacker's control, leading to a Denial of Service (DoS) condition. Continued execution of th
nvd
CVE-2021-0286HIGHCVSS 7.5v19.2v19.3+6 more2021-07-15
CVE-2021-0286 [HIGH] CWE-703 CVE-2021-0286: A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Evolved (EVO) allows an attacker to send specially crafted packets to the device, causing the Advanced Forwarding Toolkit manager (evo-aftmand-bt or evo-aftmand-zx) process to crash and restart, impacting all traffic going through the FPC, resulting in a Denial of Ser
nvd
CVE-2021-0292MEDIUMCVSS 6.5v19.4v20.1+1 more2021-07-15
CVE-2021-0292 [MEDIUM] CWE-400 CVE-2021-0292: An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Pr An Uncontrolled Resource Consumption vulnerability in the ARP daemon (arpd) and Network Discovery Protocol (ndp) process of Juniper Networks Junos OS Evolved allows a malicious attacker on the local network to consume memory resources, ultimately resulting in a Denial of Service (DoS) condition. Link-layer functions such as IPv4 and/or IPv6 address re
nvd
CVE-2021-0291MEDIUMCVSS 6.5v19.2v19.3+4 more2021-07-15
CVE-2021-0291 [MEDIUM] CWE-497 CVE-2021-0291: An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a An Exposure of System Data vulnerability in Juniper Networks Junos OS and Junos OS Evolved, where a sensitive system-level resource is not being sufficiently protected, allows a network-based unauthenticated attacker to send specific traffic which partially reaches this resource. A high rate of specific traffic may lead to a partial Denial of Service (
nvd
CVE-2021-0287MEDIUMCVSS 6.5v20.3v20.42021-07-15
CVE-2021-0287 [MEDIUM] CWE-754 CVE-2021-0287: In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evol In a Segment Routing ISIS (SR-ISIS)/MPLS environment, on Juniper Networks Junos OS and Junos OS Evolved devices, configured with ISIS Flexible Algorithm for Segment Routing and sensor-based statistics, a flap of a ISIS link in the network, can lead to a routing process daemon (RPD) crash and restart, causing a Denial of Service (DoS). Continued link f
nvd
CVE-2021-0250HIGHCVSS 7.5v19.22021-04-22
CVE-2021-0250 [HIGH] CVE-2021-0250: In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) f In segment routing traffic engineering (SRTE) environments where the BGP Monitoring Protocol (BMP) feature is enable, a vulnerability in the Routing Protocol Daemon (RPD) process of Juniper Networks Junos OS allows an attacker to send a specific crafted BGP update message causing the RPD service to core, creating a Denial of Service (DoS) Condition. Continued r
nvd
CVE-2021-0226HIGHCVSS 7.5v20.1v20.2+1 more2021-04-22
CVE-2021-0226 [HIGH] CWE-665 CVE-2021-0226: On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an establi On Juniper Networks Junos OS Evolved devices, receipt of a specific IPv6 packet may cause an established IPv6 BGP session to terminate, creating a Denial of Service (DoS) condition. Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue does not affect IPv4 BGP sessions. This issue affects I
nvd
CVE-2021-0259HIGHCVSS 7.4v18.3v19.1+5 more2021-04-22
CVE-2021-0259 [HIGH] CWE-755 CVE-2021-0259: Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Due to a vulnerability in DDoS protection in Juniper Networks Junos OS and Junos OS Evolved on QFX5K Series switches in a VXLAN configuration, instability might be experienced in the underlay network as a consequence of exceeding the default ddos-protection aggregate threshold. If an attacker on a client device on the overlay network sends a high volume
nvd
CVE-2021-0264HIGHCVSS 7.5v18.3v19.1+6 more2021-04-22
CVE-2021-0264 [HIGH] CWE-703 CVE-2021-0264: A vulnerability in the processing of traffic matching a firewall filter containing a syslog action i A vulnerability in the processing of traffic matching a firewall filter containing a syslog action in Juniper Networks Junos OS on MX Series with MPC10/MPC11 cards installed, PTX10003 and PTX10008 Series devices, will cause the line card to crash and restart, creating a Denial of Service (DoS). Continued receipt and processing of packets matching the fi
nvd
CVE-2021-0225MEDIUMCVSS 5.8v19.1v19.2+4 more2021-04-22
CVE-2021-0225 [MEDIUM] CWE-754 CVE-2021-0225: An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cau An Improper Check for Unusual or Exceptional Conditions in Juniper Networks Junos OS Evolved may cause the stateless firewall filter configuration which uses the action 'policer' in certain combinations with other options to not take effect. An administrator can use the following CLI command to see the failures with filter configuration: user@device>
nvd
CVE-2021-0239MEDIUMCVSS 6.5v20.42021-04-22
CVE-2021-0239 [MEDIUM] CWE-754 CVE-2021-0239: In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cau In Juniper Networks Junos OS Evolved, receipt of a stream of specific genuine Layer 2 frames may cause the Advanced Forwarding Toolkit (AFT) manager process (Evo-aftmand), responsible for handling Route, Class-of-Service (CoS), Firewall operations within the packet forwarding engine (PFE) to crash and restart, leading to a Denial of Service (DoS) cond
nvd
CVE-2021-0273MEDIUMCVSS 5.3v19.42021-04-22
CVE-2021-0273 [MEDIUM] CWE-670 CVE-2021-0273: An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Jun An always-incorrect control flow implementation in the implicit filter terms of Juniper Networks Junos OS and Junos OS Evolved on ACX5800, EX9200 Series, MX10000 Series, MX240, MX480, MX960 devices with affected Trio line cards allows an attacker to exploit an interdependency in the PFE UCODE microcode of the Trio chipset with various line cards to ca
nvd
CVE-2021-0236MEDIUMCVSS 6.5v19.1v19.2+2 more2021-04-22
CVE-2021-0236 [MEDIUM] CWE-754 CVE-2021-0236: Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Juno Due to an improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved the Routing Protocol Daemon (RPD) service, upon receipt of a specific matching BGP packet meeting a specific term in the flowspec configuration, crashes and restarts causing a Denial of Service (DoS). Continued receipt and processing of thi
nvd
CVE-2021-0211CRITICALCVSS 10.0v19.2v19.3+4 more2021-01-15
CVE-2021-0211 [CRITICAL] CWE-754 CVE-2021-0211: An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Ev An improper check for unusual or exceptional conditions in Juniper Networks Junos OS and Junos OS Evolved Routing Protocol Daemon (RPD) service allows an attacker to send a valid BGP FlowSpec message thereby causing an unexpected change in the route advertisements within the BGP FlowSpec domain leading to disruptions in network traffic causing a Den
nvd
CVE-2021-0208HIGHCVSS 8.8v19.3v19.4+1 more2021-01-15
CVE-2021-0208 [HIGH] CWE-20 CVE-2021-0208: An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper N An improper input validation vulnerability in the Routing Protocol Daemon (RPD) service of Juniper Networks Junos OS allows an attacker to send a malformed RSVP packet when bidirectional LSPs are in use, which when received by an egress router crashes the RPD causing a Denial of Service (DoS) condition. Continued receipt of the packet will sustain the De
nvd
CVE-2021-0209MEDIUMCVSS 6.5v19.4v20.12021-01-15
CVE-2021-0209 [MEDIUM] CWE-824 CVE-2021-0209: In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause In Juniper Networks Junos OS Evolved an attacker sending certain valid BGP update packets may cause Junos OS Evolved to access an uninitialized pointer causing RPD to core leading to a Denial of Service (DoS). Continued receipt of these types of valid BGP update packets will cause an extended Denial of Service condition. RPD will require a restart to r
nvd
CVE-2020-1681MEDIUMCVSS 6.5v19.2v19.3+2 more2020-10-16
CVE-2020-1681 [MEDIUM] CWE-755 CVE-2020-1681: Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device ru Receipt of a specifically malformed NDP packet sent from the local area network (LAN) to a device running Juniper Networks Junos OS Evolved can cause the ndp process to crash, resulting in a Denial of Service (DoS). The process automatically restarts without intervention, but a continuous receipt of the malformed NDP packets could leaded to an extende
nvd
CVE-2020-1666MEDIUMCVSS 6.6v19.2v19.3+2 more2020-10-16
CVE-2020-1666 [MEDIUM] CWE-284 CVE-2020-1666: The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved The system console configuration option 'log-out-on-disconnect' In Juniper Networks Junos OS Evolved fails to log out an active CLI session when the console cable is disconnected. This could allow a malicious attacker with physical access to the console the ability to resume a previous interactive session and possibly gain administrative privileges. T
nvd
CVE-2020-1678MEDIUMCVSS 6.5v19.4v20.1+1 more2020-10-16
CVE-2020-1678 [MEDIUM] CWE-400 CVE-2020-1678: On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specifi On Juniper Networks Junos OS and Junos OS Evolved platforms with EVPN configured, receipt of specific BGP packets causes a slow memory leak. If the memory is exhausted the rpd process might crash. If the issue occurs, the memory leak could be seen by executing the "show task memory detail | match policy | match evpn" command multiple times to check if
nvd